-
Notifications
You must be signed in to change notification settings - Fork 3
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. Weβll occasionally send you account related emails.
Already on GitHub? Sign in to your account
fix(vaultsecrets.secrets.create): parse correct secret-type key #216
base: main
Are you sure you want to change the base?
fix(vaultsecrets.secrets.create): parse correct secret-type key #216
Conversation
Closes: hashicorp#215 Signed-off-by: Sebastian Yaghoubi <[email protected]>
Thank you for your submission! We require that all contributors sign our Contributor License Agreement ("CLA") before we can accept the contribution. Read and sign the agreement Learn more about why HashiCorp requires a CLA and what the CLA includes Have you signed the CLA already but the status is still pending? Recheck it. |
This PR is more than 2 weeks old. Please remove the stale label, update, or comment if this PR is still valid and relevant, otherwise it will be closed in 7 days. |
Added changelog entry. Is anything else required? |
hi @syaghoubi00 thanks for the contribution! this would mean a breaking change for anyone who uses |
@dhuckins I went ahead and preserved the It might be a good idea to normalize all the opts input, since they are being parsed as string literals. eg. hcp/internal/commands/vaultsecrets/secrets/secret_types.go Lines 6 to 10 in e29db05
|
π οΈ Description
Parses correct key from
hcp vault-secrets secrets create --secret-type
Parses the literal string
static
from flag argπ Additional Link
Closes: #215
ποΈ Local Testing
π Checklist